Subscription to the full report on a daily basis can be obtained:
Send an eMail to dhsdailyadmin@mail.dhs.osis.gov with the subject "DHS Daily Open Source Infrastructure Report" and the following line in the body...subscribe.
To obtain a complete copy of the current report proceed to the DHS link below.
To obtain reports more than 10 business days old, send an eMail to DHS_Reports@e-computer-security.com. Be specific as to the reports you wish to receive.

· Approximately
19,000 DTE Energy customers were still without power June 29 after strong winds
and rain June 27 knocked out service to 158,000 homes and businesses across
southeast Michigan. – Detroit Free Press

· A
foreign national was charged with allegedly scheming to file hundreds of
fraudulent tax returns using the stolen identities of thousands of University
of Pittsburgh Medical Center employees in an indictment unsealed June 26. – Pittsburgh
Post-Gazette

· Officials
reported June 29 that 2 escaped prisoners from the New York Clinton
Correctional Facility were found after 1 escapee was found and fatally shot
June 26, while the second was shot and detained near the Canadian border June
28. – CNN

20. June 29, CNN – (New York) Source: former
prison escapee says he planned to go to Mexico. Officials reported June 29
that 2 escaped prisoners from the New York Clinton Correctional Facility were
found after 1 escapee was located and fatally shot June 26, while the second
escapee was traced 2 miles south of the Canadian border, where police shot and
detained the man June 28. Authorities plan to investigate the case further.
Source: http://www.cnn.com/2015/06/29/us/new-york-prison-break/index.html

Financial Services Sector

6. June
29, U.S. Securities and Exchange Commission – (International) SEC
charges KKR with misallocating broken deal expenses. The U.S. Securities
and Exchange Commission charged New York-based Kohlberg Kravis Roberts &
Co., June 29 with misallocating over $17 million in “broken deal” expenses to
co-investors in the firm’s private equity funds. The company agreed to pay
$28.5 million to settle the charges. Source: http://www.sec.gov/news/pressrelease/2015-131.html

For another story, see item 23 below
in the Information Technology Sector

Information Technology Sector

22. June 29,
Securityweek – (International) Security firm discloses details of Amazon
Fire Phone vulnerabilities. MWR InfoSecurity released details on three
recently patched Amazon Fire Phone vulnerabilities, including flaws in the
CertInstaller package that can allow third party applications to install
digital certificates to intercept encrypted traffic via man-in-the-middle
attacks, and an issue with the Android Debug Bridge (ADB) in which an attacker
could bypass the lock screen, steal information, add and remove applications,
and access a high privilege shell on the phone. Source: http://www.securityweek.com/security-firm-discloses-details-amazon-fire-phone-vulnerabilities

• Security researchers from Trend Micro
discovered a security flaw in the Android operating system’s debugging
component in which an attacker could create a special Executable and Linkable
Format file to crash the debugger and view dumps and log files stored in
memory, or to create a denial-of-service condition. – Softpedia See item 21 below in the Information Technology Sector

Financial Services Sector

6. June
25, Cleveland Plain Dealer – (Ohio) Three accused of Akron-based
Ponzi scheme that cost investors $17 million. Three Northeast Ohio men were
indicted June 25 on charges alleging that they defrauded 70 investors out of
$17 million from 2010 – 2014 by convincing them to give money to KGTA Petroleum
Ltd., a company partially owned by one of the suspects, and spent the proceeds
on luxury items and mortgage payments. Source: http://www.cleveland.com/court-justice/index.ssf/2015/06/three_accused_of_akron-based_p.html

19. June 26,
Softpedia – (International) Click-fraud attack morphs into ransomware
risk in a couple of hours. Security researchers at Damballa discovered that
a threat actor dubbed RuthlessTreeMafia is distributing exploit kits along with
the Rerdom malware in a click-fraud campaign in which they sell other threat
actors access to infected users’ systems. Researchers observed an infection
result in the delivery of the CryptoWall ransomware. Source: http://news.softpedia.com/news/click-fraud-attack-morphs-into-ransomware-risk-in-a-couple-of-hours-485395.shtml

20. June 26,
Securityweek – (International) Default SSH keys expose Cisco’s virtual
security appliances. Cisco reported that customers using its Web Security,
Email Security, and Security Management Virtual Appliances were vulnerable due
to the products’ use of default secure shell (SSH) keys, which could allow an
unauthenticated, remote attacker to connect to a system with root user
privileges. The company released a patch addressing the issue. Source: http://www.securityweek.com/default-ssh-keys-expose-ciscos-virtual-security-appliances

21. June 26,
Softpedia – (International) 94% of Android devices vulnerable to bug
exposing memory content. Security researchers from Trend Micro discovered
security flaw in the Android operating system’s (OS) debugging component in
which an attacker could create a special Executable and Linkable Format (ELF)
file to crash the debugger and view dumps and log files stored in memory, or to
create a denial-of-service (DoS) condition. The issue affects all Android versions
after 4.0, Ice Cream Sandwich. Source: http://news.softpedia.com/news/94-of-android-devices-vulnerable-to-bug-exposing-memory-content-485382.shtml

22. June 25,
Threatpost – (International) Stored XSS flaw patched in Thycotic secret
server. Thycotic patched a stored cross-site scripting (XSS) vulnerability
in its Secret Server product in which an attacker could use JavaScript code in
the browser of a valid user to toggle the password mask and steal a victim’s
stored passwords. Source: https://threatpost.com/stored-xss-flaw-patched-in-thycotic-secret-server/113473

For another
story, see item 15 below from the Healthcare and Public Health
Sector

15. June 25, Securityweek – (National) U.S.
healthcare companies hardest hit by ‘Stegoloader’ malware. Security
researchers from Trend Micro reported that North American healthcare
organizations are the primary victims of the Stegoloader Trojan, a malware
identified as TROJ_GATAK which embeds malicious code in image files to avoid
detection and has anti-virtual machine and anti-emulation capabilities to
prevent analysis. Source: http://www.securityweek.com/us-healthcare-companies-hardest-hit-stegoloader-malware

Communications Sector

23. June 25, Victorville
Daily Press – (California) Verizon offering reward for copper
theft information. Verizon officials announced June 25 that the company is
offering a reward of up to $10,000 for information leading to the arrest and
prosecution of the suspect, or suspects, responsible for the theft of roughly
16,000 feet of copper communication cables throughout Southern California. The
company has implemented “additional security measures” to prevent future thefts
and is working with State and local law enforcement authorities. Source: http://www.vvdailypress.com/article/20150625/NEWS/150629826

24. June 25, Columbia Daily
Herald – (Tennessee) Internet outages reported in area. About
1,000 customers of Columbia Power and Water Systems (CPWS) and other Internet
providers in Columbia, Tennessee experienced outages June 24 – June 25 after a
laser in CPWS’ data center was damaged and due to a fiber optic cable cut.
Source: http://columbiadailyherald.com/news/local-news/internet-outages-reported-area

Links

About Me

U.S. Army Retired Chief Warrant Officer with more than 40 years in information technology and 35 years in information security. Became a Certified Information Systems Security Professional in 1995 and have taught computer security in Asia, Canada and the United States. Wrote a computer security column for 5 years in the 1980s titled "for the Sake Of Security", penname R. E. (Bob) Johnston, which was published in Computer Decisions.
Motto: "When entrusted to process, you are obligated to safeguard"